When it comes to cyber-warfare and hacking tools, the US has been undisputed number in the world for many decades even though it’s now being challenged by some countries like China, Russia, Iran, and North Korea, the US remains on top of the list of countries with the most powerful cyber-attack tools in the world.
In 2016, the US spy agency the CIA said that it will be impossible to collect any data from China by 2021 as it expected China to go dark by that time due to the development and use of quantum computing and communication and it warned that the US needed to come up with a solution on how to continue collecting data from China without using old methods.
According to a Chinese new paper, the Global Times, the US has been using its most powerful cyber attack tool of US national security agency (NSA) called QUANTUM attack system which is capable of monitoring, intercepting, and utilizing data that US National Security Agency (NSA) collected from global network communication and internet system to target China.
According to Chinese cyber experts, the US used a cyber weapon called QUANTUM attack system through National Security Agency (NSA) to attack China. The weapon is reportedly to be capable of monitoring and hijacking users’ social media accounts, emails, and communication information.
This is the second time in less than a month that the internet security company, 360 has revealed evidence of the National Security Agency (NSA) ongoing large-scale operations around the world, in particular targeting China.
360 internet security company has revealed the evidence to show that in March, NSA targeted the communication industry and other key areas and hundreds of millions of people around the world had no safe place to hide their private and sensitive information which was just like “running naked” and China which was its top target suffered millions of attacks.
According to the report published on Tuesday by 360 internet security company, QUANTUM attack system is a cyber hijacking tool that NSA especially designed attack users on Facebook, Twitter, YouTube, Amazon, and other websites. The users of Chinese social media applications like QQ, developed by one of China’s biggest internet companies Tencent, have also been a key target.
According to cyber security experts from 360 internet security company, the data from around the world which was stolen by NSA include network profiles, account numbers and passwords, office and private documents, databases, online friend’s information, communication information, emails, real-time data from cameras and microphones.
Fully automatic AI
According to the report, the QUANTUM attack system is the most powerful cyber attack tool of the NSA and is also one of its most important capability systems for cyber intelligence warfare. The QUANTUM attack system was founded in 2004 and contains several sub-projects, whose names all begin with ” QUANTUM”.
360 security lab has discovered that it contains nine advanced cyber-attack capability modules, including quantum bit, quantum and, quantum copper, and quantum mack-down.
The QUANTUM attack system could hijack national network communication to carry out a series of complex network attacks such as vulnerability exploitation, communication manipulation, and intelligence theft.
A QUANTUM attack can hijack the normal web traffic of any internet user anywhere in the world and remotely implant a back door program according to cyber security experts. This is so scary to people like us who use the internet most of the time, our private information may be already taken by NSA.
According to the report, the QUANTUM attack was usually implemented into three stages. In the first stage, quantum attackers would first locate the target. According to NSA’s confidential documents, such attacks could position global websites and accounts such as emails, social media platforms, search engines, video sites, quickly finding out the Target’s address.
In the second stage, the attackers would monitor targets’ accounts and other activities. The NSA’s confidential documents show the details of how the quantum attack system monitors users’ information on Yahoo, Facebook, and Hotmail. This proves that NSA is monitoring internet users around the world.
In the third stage, the NSA began to implement vulnerability exploitation attacks, implanted its back door programs into victims’ accounts, and stole a large amount of personal data. The vast amount of data collected throughout the attack was obtained without the user’s knowledge.
Undifferentiated Attacks
The undifferentiated cyberattacks conducted by NSA across the globe couldn’t have been achieved without the support of a huge and complex network of cyber weapon platforms. The undifferentiated cyberattacks conducted by the NSA target the entire world including US allies.
The undifferentiated cyberattacks from NSA also refer to the fact that all the internet users of emails, social media platforms, search engines, and video websites are targeted. According to experts, no country can stand alone under the sickle of US cyberattacks which are global and immoderate.
According to cyber experts’ warnings, the ambition of the US in cyber warfare will only increase. The US may install hardware or back door programs into the victim’s computer and achieve remote control on the target including military systems, servers in the field of national public security, civil aviation transportation systems, and bank financial system which will make its rivals have no room for negotiation.
To be a dominant power of cyber warfare, the US with already advanced Internet technology has incorporated large numbers of top technological means such as quantum attack systems, high-end talents, and intelligence forces into warfare dispositions. This highlights how the US attaches great importance to developing its power in cyber warfare, regardless of the costs and pouring in resources and leverage.
In the 21st century, Cyber is the most dangerous weapon with the ability to cause massive destruction, cyber is cheap to develop and can be operated from anywhere in the world to take out a country’s enemy’s important infrastructure like electricity grid systems, water systems, banking and financial systems, transportation systems, healthcare system, the internet, and network communication systems including military infrastructure making the military blind from enemy’s attack.
Chaos is assured if half the above infrastructure comes under cyber-attacks and countries including China, US, Russia, UK, Iran, Israel, and India are investing in a lot of resources to make they don’t fall victim to cyberattacks.